Professional Documents
Culture Documents
EmpTech - Q1 - Mod2 - Online Safety, Security, Ethics, and Etiquette
EmpTech - Q1 - Mod2 - Online Safety, Security, Ethics, and Etiquette
Empowerment
Technologies
Quarter 1–Module 2
Online Safety, Security, Ethics, and Etiquette
In this phase of our country where a hacker outbreak increase unevenly every single
seconds, online security can no longer be taken lightly. Otherwise, your complete
individual personal information could be in danger. In order for us to secure information,
online security is designed to prevent credit card theft, or something as simple as you
using antivirus software to protect your device. We need to aware of the rules that are
followed and actions that are taken to make sure online user information and
confidentiality aren‟t negotiated by cybercriminals.
This module was designed to provide you with fun and meaningful opportunities for
guided and independent learning at your own pace and time. You will be enabled to
process the contents of the learning resource while being an active learner.
What I Need to Know
In this module will apply online safety, security, ethics, and etiquette standards and
practice in the use of ICTs as it would relate to their specific professional tracks will be
tackled.
It gives you the practice and safeguards that should be discerned when you are using
internet you need to ensure that the users as well their computers and personal data
are safe from crimes related in using the internet.
For the learner
Internet is defined as the info electronic networks. This means that any person has
access to these nets, where students can place info and can grab that info.
This topic introduces the learners to discern promising data and erroneous valued data.
Directions: Read each item carefully, choose the letter of the correct answer and write
your answers in your notebook.
1. It is the knowledge of maximizing the user‟s personal safety and security risks on
private information and property associated with using internet and self-
protection from computer crime in general.
A. Measures
B. Online Safety
C. Online Threats
D. Safety Measures
2. It is an act performed by a knowledgeable computer user sometimes referred to
as hacker that illegally browses or steal someone„s information?
A. Online Ethics and Netiquette
B. Online Measures
C. Online Safety
D. Online Threats
3. It is refers to the right of the individuals to deny or restrict the collection and used
of information about them.
A. Computer Ethics
B. Confidentiality
C. Privacy
D. Phishing
4. It is a set of rules and norms for acceptable conduct or behavioral online.
A. Measures
B. Netiquette
B. Online Safety
D. Online Threats
5. This concerned with how computing professional should make decisions
regarding professional and social conduct.
A. Computer Ethics
B. Netiquette
C. Online Safety
D. Phishing
Apply online safety, security, ethics, and
Lesson
etiquette standards and practice in the use of
2 ICTs as it would relate to their specific
professional tracks.
On-line safety sometimes denoted to as digital safety, or cyber safety, Internet safety, is
a comparatively new concept that has full-grown with progresses in the Internet. On the other
hand , it includes some facets to Internet safety. Generally, the word refers to practices and
precautions you should observe when using the Internet, so as to guarantee that your personal
info and your computer remain safe.
What’s In
What’s New
Online safety talks about the practices and precautious that should be observed when using the
internet to protect the users as well as their computers and personal info if there are safe from
the wrongdoings associated in using the internet. Numerous crimes that can be committed on
the internet; like stalking , identify theft , privacy violations and harrashment.
On the other hand ,online safety measures means never give any personal information about
yourself over the Internet . There is also an online threats which is an act performed by a
knowlegeable computer user sometimes reffered to as hacker that illegally browses or steal
someone‟s information. In this advancement, we have a lot of categories of threats that are
increasing in this world of scheme like phishing, pharming, internet scam , botnet ,malware,
virus and worm, bug, cyber staking, cyber bullying , cyber harrasment and spoofing.As a user
we must be aware of the online ethics and netiquette to maintain our privacy . Morever ,
netiquette is a set of rules and norms for acceptable conduct or behavioral online while
computer ethics is concerned with how computing professionals should make decisions
regarding professional and social conduct . We must consider to learn the terms like
authentication, user indentification , possessed object , biometric device, and callback system.
Key terms
Cyber- crime - a crime committed or assisted through the use of the Internet.
Privacy Policy/Terms of Services (ToS) - tells the user how the website will handle its data.
Malware - stands for malicious software.
Virus - a malicious program designed to transfer from one computer to another in any means
possible.
Worms - a malicious program designed to replicate itself and transfer from one file folder to
another and also transfer to other computers.
Trojan - a malicious program designed that is disguised as a useful program but once
downloaded or installed leaves your PC unprotected and allows hacker to get your
information.
Spyware - a program that runs in the background without you knowing it. It has the ability to
monitor what you are currently doing and typing through key logging.
Adware - a program designed to send you advertisement, mostly pop-ups.
Spam - unwanted email mostly from bots or advertisers.
Phishing - acquires sensitive personal information like passwords and credits card details.
Pharming - a more complicated way of phishing where it exploits the DNS system.
Copyright - a part of law, wherein you have the rights to work, anyone who uses it w/o your
consent is punishable by law.
Answer the following questions and write your answers in your notebook.
Discussion of Activity 1
Be Aware of ATTACK!
Directions: Identify and find the correct answer on the box and write your correct answer
on the separate sheets of paper.
1. As a student, how do you secure your privacy while you are using the internet?
2. When using public computer terminal, what should we do?
3. What you must consider when you are downloading or installing software or
anything on your computer or cellphone that is unknown to you?
Independent Assessment 1
Directions: Read some network netiquette. Write Yes if you
are agree and No if you are disagree. Write your
answer on a separate sheet of paper.
Independent Activity 2
“To stay safe online we must install and update
antivirus software on your computer.”
Independent Assessment 2
Directions: Give your opinion or thoughts regarding the situation.
Write your answer on a separate sheet of paper.
Independent Activity 3
Directions: Design your own brochure. Prepare a one sheet of a band or art paper.
TASK
Create a brochure, telling students how to
stay safe online. Start with the outside pages
today:
Back page
Internet Safety
Front Page Must
Tips be eye catching
to make people
want to open the
brochure .tomak
Notes: If you checked 7 or more items, you are safe. If you checked 5-6 items, you may be
placing yourself in danger. If you checked fewer than 5 items, you are unsafe. If you
checked fewer than 7 items, you should consider changing your online practices. In the
space below, state how you can improve your Internet safety.
Reflect on what you have learned after taking up the module by completing the chart
below (2-3 sentences). Write your answer on a separate sheet of paper.
What new or
additional ideas
did you learn
after taking up
this lesson?
What I Can Do
Directions: What are things you should do if you are in this scenario? Write your answer
on separate sheet paper.
Scenario: In your own experience, imagine if someone gained access to any of your
social media accounts they could change your account name, password and recovery
data in order to lock you out and take total control. They could even go as far as
pretending to be you and send out compromised messages to your contacts and this list
is endless really. To help you stay safe from hackers and protect your social media
accounts.
Assessment
Directions: Read each item carefully and choose the letter of the correct answer. Write
your answers on your notebook.
1. This concerned with how computing professional should make decisions regarding
professional and social conduct.
A. Computer Ethics
B. Netiquette
C. Online Safety
D. Phishing
2. It is the knowledge of maximizing the user‟s personal safety and security risks on
private information and property associated with using internet and self- protection
from computer crime in general.
A. Measures
B. Online Safety
C. Online Threats
D. Safety Measures
3. It is a set of rules and norms for acceptable conduct or behavioral online.
A. Measures
B. Netiquette
C. Online Safety
D. Online Threats
4. It is refers to the right of the individuals to deny or restrict the collection and used of
information about them.
A. Computer Ethics
B. Confidentiality
C. Privacy
D. Phishing
5. It is an act performed by a knowledgeable computer user sometimes referred to as
hacker that illegally browses or steal someone„s information?
A. Online Ethics and Netiquette
B. Online Measures
C. Online Safety
D. Online Threat
6. To be safe, social link sites;
A. You must require that you follow some precautions.
B. You should never be used.
C. You should require your registration.
D. You must post information.
7. One of the best ways to stay safe on a social network site is to:
A. choose a site that allows you to control who sees your page
B. give your information
C. post your picture
D. use an anonymous username
8. Social network sites allow you to:
A. make plans with your friends, make new friends, apply to colleges
B. make plans, make new friends, share your thoughts
C. post your picture.
D. share your thoughts, order pizza, keep track of friends
9. An important downside aspect of social network sites is that they are:
A. confusing for most people to use.
B. expensive.
C. using for looking for someone to acquaintance to meet other people.
D. where dangerous criminals may target victims.
10. Criminals who go on social network sites:
A. Are expert liars who know how to cultivate your trust.
B. Are making plans to make friends and share information.
C. Are often petty criminals who are not really dangerous.
D. Never disguise their identity.
Additional Activities
On a separate sheet of paper, write at least 100-150 words about your thoughts in the
“Data Privacy Act of 2012 REPUBLIC ACT NO. 10173An Act Protecting Individual
Personal Information In Information And Communications Systems In The
Government And The Private Sector, Creating For This Purpose A National
Privacy Commission, And For Other Purpose!”. Provide sound evidences to
strengthen your claim/s.
Independent Independent Activity 2 Assessment
Assessment 1 1. Norton A
B
YES 2. F-Secure
B
NO
3. SMADAV C
YES
D
NO
4. ESET NOD32 A
NO
D
YES 5. Kaspersky D
YES
B
YES 6. Bitfender C
NO
YES
What I Know What‟s New/ What‟s More/ What Is It?
B Independent Activity 3 Malware
D Adware
C Independent Assessment 3 Virus
B Worm
Independent Activity 3 Trojan
A
/What I have Learned/ Spyware
Spam
What Can I do? Phishing
Botnet
Denial Service
Attack
Additional Activity
1.Answers may vary
Answer Key
References